PUF Evaluation with Post-processing and Modified Modeling Attack

1 downloads 0 Views 574KB Size Report
Jul 4, 2013 - kang@ee.kagu.tus.ac.jp, iwamura@ee.kagu.tus.ac.jp. 2 [email protected], [email protected],. 3 [email protected]. Abstract. Physical ...
International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

PUF Evaluation with Post-processing and Modified Modeling Attack Hyunho Kang1, Yohei Hori2, Toshihiro Katashita2, Akashi Satoh3, and Keiichi Iwamura1 1

Department of Electrical Engineering, Tokyo University of Science, 6-3-1 Niijuku, Katsushika-ku, Tokyo 125-8585, Japan 2 Research Institute for Secure Systems, National Institute of Advanced Industrial Science and Technology (AIST),Central 2, 1-1-1 Umezono, Tsukuba, Ibaraki 305-8568, Japan 3 Department of Communication Engineering and Informatics, The University of Electro-Communications,1-5-1 Chofugaoka, Chofu, Tokyo 182-8585, Japan 1

2

[email protected], [email protected] [email protected], [email protected], [email protected] Abstract

Physical unclonable functions (PUFs) have outstanding unique and non-reproducible properties owing to inter-chip variations. However, the amount of randomness in a PUF output could be a significant limitation. In this study, by passing the PUF response to a shift register, the randomness of the PUF output can be greatly increased while maintaining reliability. We discuss the performance of an arbiter-type PUF and a ring-oscillator-type PUF with a simple shift register from the viewpoint of biometrics. Moreover, PUFs, particularly linear delay-based PUFs, are not designed for machine learning or linear programming, which makes innovation difficult. We further focus on an efficient PUF evaluation method by using linear programming and logistic regression in the case of the challenge response pairs (CRPs) with low entropy. Keywords: Physical Unclonable Function (PUF), Arbiter PUF, Ring Oscillator PUF, SASEBO-GII, Performance Evaluation

1. Introduction Physical unclonable functions (PUFs) involve variations in device manufacturing and could be useful for authentication of integrated circuits or for key storage using highly secure methods. This is considered one of the most striking discoveries in the computer security field and is ushering in a new era for security [1]. Over the past decade, several interesting constructions have been proposed in the literature [2]. The arbiter PUF [3] and ring oscillator (RO) PUF [4, 5] are the most popular designs, which produce a unique output for each challenge input. However, it has been claimed that the amount of randomness in the PUF output is limited [6]. Therefore, the response of the PUF cannot be used directly as a key. Thus, several post-processing schemes for the PUF output have been developed, such as majority voting and the fuzzy extractor [6, 7]. Majority voting is a convenient method to poorly transform uniform and noisy measurements into more random distributions with less noise, while the fuzzy extractor corrects bit errors in the non-uniform PUF responses and extracts uniform random bits. However, these methods fail to increase the amount of randomness in the PUF output to a sufficient level.

231

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

One solution is to pass the PUF output through a simple shift register so that randomness can be greatly increased while maintaining reliability. In this paper, we discuss the performance of a shift-register-based post-processing from the viewpoint of biometrics, i.e., using the equal error rate (EER). In addition, we focus on determining the reliability and security (uniqueness) of the system on the basis of the differences in the outputs from the same PUFs and from different PUFs for the same challenge (SC intra-PUF and SC inter-PUF, respectively). We performed an evaluation using modeling attacks of Silicon arbiter PUFs. Lim et al., [8] introduced arbiter-based PUFs that use a differential structure and an arbiter to measure the difference in the delay between the paths. However, if a notable correlation exists between challenges and responses, then an adversary can build a software model of the PUF. Recent studies [9, 10] showed that model building might be feasible by using machine learning techniques or linear programming. Note that we are concerned with a combined modeling attack when challenge response pairs (CRPs) with low entropy exist. In this context, entropy means the degree of randomness of CRPs. The rest of the paper is organized as follows: in Section 2, our evaluation approach is presented; in Section 3, the concept of shift-register post-processing is described; in Section 4, our experimental results are presented; in Section 5, the evaluation of combined modeling attacks are presented; finally, in Section 6, we present our conclusions.

2. Evaluation Approach PUFs can be evaluated on the basis of the differences in the responses of the same device (intra-PUF) and of the differences between devices (inter-PUF). Furthermore, they can be evaluated for differences in the responses to the same challenge (SC) and to different challenges (DC). Thus, we define the following four parameters, as illustrated in Figure 1: SC intra-PUF, DC intra-PUF, SC inter-PUF, and DC inter-PUF. First, to evaluate the reliability of our PUF system, experiments were conducted to measure the EER and sensitivity index d  for each PUF system using SC intra-PUF and DC intra-PUF. Ideally, SC intra-PUF should be small and DC intra-PUF should be large; in other words, these two distributions should be sufficiently separated from each other. In the biometric research community, the overall accuracy is illustrated by the receiver operation characteristic (ROC) curve, which shows the dependence of the false rejection rate (FRR) on the false acceptance rate (FAR) at all thresholds. The EER is computed as the point where FAR is equal to FRR. To evaluate our PUF testing, we also utilized these properties. In addition, we defined a metric d  , as suggested by Daugman [11], to assess the degree of separation between the two distributions:

d 

m  n

1 2 ( m   n2 ) 2

(1)

where  m and  n are the means and  m and  n are the standard deviations of the two distributions, respectively. Second, large SC inter-PUF and DC inter-PUF of complete PUF systems would be ideal to test the security of the PUF systems (i.e., uniqueness). However, in this research, we studied only SC intra-PUF and SC inter-PUF to evaluate the PUF systems with and without shiftregister-based post-processing.

232

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

Challenge (64bits) 1 0

Riging Edge

AIST dataset 1 0

1 0

c1

c2

c64

0 1

0 1

0 1

Mux1 RO2

1

. . .

Challenge1(9bits) Challenge2(9bits)

RO512

Arbiter PUF1



Arbiter PUF45

VirginiaTech Dataset

Response 0 or 1

>?



RO-PUF1

Mux2



RO-PUF125





shift

20 times of test

5



50 kinds of IDs

1 1 if top path is faster, 0 else 0

Arbiter

Response (1bit)

RO1

Enable

Response (1bit)

Not change Reliability Higher Security (Uniqueness)

128bits response direction 128bits response

Limitation of randomness =>Post-processing is needed

2

128

Hamming distance (HD)

3

SC DC

0

HD

Security (Uniqueness)

Count rate

Count rate

Count rate

Reliability Same challenge (SC) Different challenge (DC)

0

4

• Regarding all devices

• Regarding each device

128

SC Intra-PUF SC Inter-PUF

0

HD

128

(ID:50, Test:20) SC Intra-PUF: 9,500 pair comparisons, DC Intra-PUF: 490,000 pair comparisons (Devices: 45) SC Inter-PUF: 19,800,000 pair comparisons, DC Inter-PUF: 485,100,000 pair comparisons (Devices: 125) SC Inter-PUF: 155,000,000 pair comparisons, DC Inter-PUF: 3,797,500,000 pair comparisons

Figure 1. Schematic of our Evaluation Approach

3. Shift Register Figure 1 (arrow 5) shows the creation of the shifted response database. Note that shifting bits to the right depends on the intrinsic properties of each PUF. In our experiment, fixed bits were shifted for testing, e.g., 1 bit for PUF1, 2 bits for PUF2, and 45 bits for PUF45. Notably, shifting with a 128-bit response direction is simple and easily applicable to the PUF output while maintaining reliability.

233

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

4. Experimental Results 4.1. Arbiter PUF The field-programmable gate arrays (FPGAs) used in this experiment were a Xilinx's Virtex-5LX (xc5vlx30-ffg324) and a Spartan-3A (xc3s400a-ftg256) on SASEBO-GII evaluation boards [12-13]. We selected 45 arbiter PUF outputs from 20 tests and 50 kinds of IDs (called “AIST dataset” in Figure 1) from a total of 45 outputs with 1024 tests and 1024 kinds of IDs [14]. First, we tested the reliability of each PUF output. As shown in Figure 2(a), the SC intra- PUF distribution and the DC intra-PUF distribution were computed and plotted to determine how the PUF algorithm separates the two classes. The figure shows a histogram of the count rates versus the hamming distance for the PUF1 output. In this experiment, we obtained ideal results with no errors. As shown in Figure 2(b), all of the other results also had zero error and a stable d  . Therefore, we can conclude that the reliability of each PUF output is high. In addition, we considered the EER and d  values to evaluate the security (uniqueness) for 45 arbiter PUFs (“SC intra gathering from 45 PUFs” and “SC inter gathering from 45 PUFs”). Figure 2(c) shows a histogram of the count rate versus the hamming distance for all PUF outputs combined (45 arbiter PUFs). In this experiment, the threshold number was set to 4 and the EER was 2.89%. Even though this performance is sufficient for a non-strict authentication system, it is not suited for a strict authentication system, such as in cryptographic applications. In order to solve this problem, we applied shift registers for post-processing the PUF output. As shown in Figure 2(d), the distribution with a shift register (“SC inter gathering from 45 shifted PUFs”) is ideal with no errors, and d  is 15.18 against “SC intra gathering from 45 PUFs.” 4.2. Ring Oscillator PUF In this experiment, we selected 125 PUF outputs with 20 tests and 50 kinds of IDs from a total of 125 RO-PUF outputs (called “VirginiaTech Dataset” in Figure 1) that were collected from 125 Xilinx Spartan (XC3S500E) FPGAs [15]. (Each output contained 512 lines for 512 ROs, and each line contained 100 RO frequencies.) We first tested the reliability of each PUF output. As shown in Figure 3 (a) and (b), all of the results had zero error rates. Therefore, we can conclude that the reliability of each RO-PUF output is high. In addition, we considered the EER and d  to evaluate the security (uniqueness) of the RO-PUFs (“SC intra gathering from 125 RO-PUFs” and “SC inter gathering from 125 RO-PUFs”). As shown in Figure 3 (c), the result showed a zero error rate. Thus, the security of the RO-PUFs using the VirginiaTech dataset is reasonably good, even though d  is slightly small (8.48). In order to maintain stable security, it is desirable to sufficiently separate the two distributions. Therefore, we can apply the shift function to the PUF output in the same way as in the previous subsection. As shown in Figure 3 (d), the distribution with the shift register (“SC inter gathering from shifted 125 ROPUFs”) is ideal with no errors, and d  is 15.50 against “SC intra gathering from 125 RO-PUFs.”

234

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

0.7

EER: 0.00, FAR: 0.00, FRR: 0.00, d': 15.96

20

SC intra-PUF1 DC intra-PUF1

0.6

18

16.2361

15.9818 16.4721 16.1250

16.4258

16.2271

14

0.4

16.0106 15.7900 15.7485 16.1913 12 15.9590 16.0804 10

9,500 pair comparisons

0.3

d'

Count rate

16

0.5

490,000 pair comparisons

15.8621 15.6608

8 6

0.2

High Reliability

4

0.1 0 0

2

20

40

60

80

100

0 0

120

5

10

0.7

0.7

SC intra gathering from 45 PUFs SC inter gathering from 45 PUFs

Count rate

Count rate

427,500 pair comparisons

35

40

45

SC intra gathering from 45 PUFs SC inter gathering from shifted 45 PUFs

Higher Uniqueness 0.4

427,500 pair comparisons

0.3

19,800,000 pair comparisons

0.2

19,800,000 pair comparisons

0.1

0.1 0 0

30

0.5

0.4

0.2

25

EER: 0.00, FAR: 0.00, FRR: 0.00, d' : 15.18

0.6

0.5

0.3

20

(b) d’ of each DC intra-PUF against SC intra-PUF (Reliability in 45 Arbiter PUFs)

EER: 2.89, FAR: 4.75, FRR: 1.02, T: 4, d' : 3.32

0.6

15

The index of tested PUFs

HD (a) Distribution of SC intra-PUF and DC intra-PUF (Reliability in Arbiter PUF1)

20

40

60

80

100

120

0 0

20

40

60

80

100

120

HD

HD

(c) Distribution of SC intra-PUF and SC inter-PUF which are combined with all pair comparisons

(d) Histogram result using shifted data (Security in 45 Arbiter PUFs)

Figure 2. Reliability and Security in 45 Arbiter PUFs

5. Modeling Attacks using two PUFs with Aging Degradation A system large-scale integration (LSI) is known to cause hardware error due to age-related degradation. In our modeling attack, the arbiter PUF was tested about two years after the PUFs were first manufactured. Although the test had a very interesting outcome, the arbiter PUF eventually became more stable as a consequence of this test. For the data in this study, we selected the CRPs for 10 test iterations using 200 IDs from each of two tested SASEBO-GII boards, which are different boards implemented with the same arbiter PUF structure.

235

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

0.7

EER: 0.00, FAR: 0.00, FRR: 0.00, d': 15.38

20

SC intra-RO-PUF1 DC intra-RO-PUF1

0.6

18

16.4628

15.9971

15.4272

15.9930

15.9908

16 14 12

0.4

d'

Count rate

0.5

9,500 pair comparisons 490,000 pair comparisons

0.3

15.1849

15.3794

14.9756

14.7620

14.7656

10 8

High Reliability

6

0.2

4

0.1 0 0

2

20

40

60

80

100

0 0

120

HD (a) Distribution of SC intra-RO-PUF and DC intra-RO-PUF (Reliability in RO-PUF1)

0.7

EER: 0.00, FAR: 0.00, FRR: 0.00, d' : 8.48

0.7

SC intra gathering from 125 RO-PUF SC inter gathering from 125 RO-PUF

0.6

155,000,000 pair comparisons

80

100

120

EER: 0.00, FAR: 0.00, FRR: 0.00, d' : 15.50 SC intra gathering from 125 RO-PUF SC inter gathering from shfted 125 RO-PUF

Higher Uniqueness

0.4

1,187,500 pair comparisons

0.3

155,000,000 pair comparisons

0.2

0.1 0 0

Count rate

Count rate

1,187,500 pair comparisons

0.3

60

(b) d’ of each DC intra-RO-PUF against SC intra-RO-PUF (Reliability in 125 RO-PUFs)

0.5

0.4

40

The index of tested RO-PUFs

0.6

0.5

0.2

20

0.1

20

40

60

80

100

120

HD (c) Distribution of SC intra-RO-PUF and SC inter-RO-PUF which are combined with all pair comparisons

0 0

20

40

60

80

100

120

HD (d) Histogram result using shifted data (Security in 125 RO-PUFs)

Figure 3. Reliability and Security in 125 RO-PUFs By comparing the SC intra and DC intra of PUF1 and PUF2 in Figure 4, we see that the PUF’s HD (Hamming Distance) is divided into two distinct classes depending on the properties of the challenge. The peaks of the two sets of histograms are clearly separated, indicating that errors did not occur, in terms of FAR and FRR. The test for uniqueness indicates that no identification errors exists because the intra and inter SC distributions do not overlap. However, their uniqueness is clearly not stable. As mentioned in the introduction, we focused on efficient modeling attacks against CRPs with low entropy. Therefore, these unstable data are suitable for this scenario. 5.1. Linear Programming We describe an equation extracted from Ref. [9]. Equation 2 is extremely useful when carrying out a linear programming attack. Here, the y i parameter denotes the imbalance in the signal propagation paths in the i th stage of the PUF. If we can determine the parameter values with reasonable precision, we can compute the PUF’s response to an arbitrary challenge.

236

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

Number of comparison : 9000 (SC Intra-PUF), 1990000 (DC Intra-PUF) 20000 (SC Inter-PUF), 1990000 (DC Inter-PUF) 0.35

0.3

SC Intra of PUF1 SC Intra of PUF2 DC Intra of PUF1 DC Intra of PUF2 SC Inter of two PUFs DC Inter of two PUFs

SC Intra of PUF2 SC Intra of PUF1

0.25 0.07

0.065

0.2

Minimum HD of SC Inter: 12 0.15

DC Intra of PUF1 DC Inter of two PUFs

Count rate

Count rate

Maximum HD of SC intra: 9

0.06

DC intra of PUF2 0.055

SC Inter of two PUFs 0.05

magnification

0.1 0.045 51

52

53

54

55

56

57

58

59

Hamming distance

DC Intra of PUF1 DC Intra of PUF2 DC Inter of two PUFs

0.05

0

0

20

40

60

80

100

120

Hamming distance

Figure 4. Reliability and Uniqueness of Two PUFs with Two Years of Degradation

 (1) P1  R  P( 2)  R( 2) (1) 1    P1( k )  R ( k ) (1) (1)

(1 )

(1)

 R (1)

 (1) Pn

(2)

 R( 2)

 (1) Pn

(1) P2 (1) P2

 (k )

(1) P2

( 1)

 R ( 1)

(2)

 R(2)

  R( k )

(k )

 (1) Pn

 R(k )

(1 ) (1) R   y1  (2)    (1) R   y 2   0        (k )  (1) R   y n 1 

(2)

where R and P denote the response bits and Pi  Ci  Ci 1    Cn with challenge C . This paper does not discuss this topic in detail but offers some information regarding implementation. The following MATLAB function (linprog) from the optimization toolbox solves linear programming problems.

y  linprog ( f , A, b) This function solves min f   y such that A  y  b . The left-hand side of Equation 2 can be used as the input parameter A . P formed by an arbitrary challenge (refer to Equation 2) is used as the input parameter f .

237

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

5.2. Logistic Regression We present a summary of logistic regression, according to Ref. [10]. The output t of an arbiter PUF is determined by the sign of the final delay difference. Equation 3 shows



 

that the vector  via  T   0 defines a separating hyperplane in the space of all feature vectors  . In other words, the determination of this hyperplane allows PUF prediction.

  t  sgn( T )

(3)

  where  and  denote the delays (similar to y in the previous subsection) and a function of the applied k-bit challenge C . This function can be described as follows:



k i 1

(1  2bi ) for l  1,, k

where b denotes the challenge bits. It is important to note that  provides a solution, similar to P in the previous subsection. LIBLINEAR [16, 17], which was used in this study, is an open-source library and can support logistic regression and linear support vector machines. 5.3. Combined Modeling Attack As mentioned earlier, the tested CRPs used in the experiments have low entropy. Therefore, as the first step in our analysis, we examined zero/one prediction rate by using logistic regression and a linear programming method. The results of analysis show that logistic regression gives an optimal solution in the case of one prediction (the response bit), while linear programming gives an optimal solution in the case of zero predictions (refer to Figure 5). We can combine them to develop an efficient evaluation method against these PUFs with low entropy. Figures 6–8 show the prediction success rate against the required number of CRPs.

……. c1

c2

Arbiter

c6 3

1 0

c6 4

Challenge (64bits)

Response (1bit)

CRPs Low entropy

High entropy General evaluation

Logistic regression

Linear programming

Zero prediction rate : 68.90% One prediction rate : 97.60% Zero prediction rate : 85% One prediction rate : 69%

Combined modeling attack (efficient evaluation method)

Figure 5. Arbiter-based PUF and the Concept of a combined Modeling Attack

238

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

Maximum rate/index of one response: 97.600%/17157 Maximum rate/index of response: 88.50%/7669 Maximum rate/index of zero response: 68.90%/6797

100 90

Prediction success rate (%)

80

One response

Response 70 60 50

Zero response 40 30

Response Zero response One response

20 10 0

2000

4000

6000

8000

10000

CRPs

12000

14000

16000

18000

Performed by logistic regression

Figure 6. Prediction Success Rate obtained by Logistic Regression (CRPs: 1– 18000) Maximum rate/index of one response: 69.00%/4 Maximum rate/index of zero response: 84.00%/10

100 90

Prediction success rate (%)

80 70 60 50 40 30 20

Zero response One response

10 0 100

200

300

400

500

600

CRPs

700

800

900

1000

Performed by Linear Programming

Figure 7. Prediction Success Rate obtained by Linear Programming (CRPs: 100–1000)

239

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

Maximum rate/index of one response: 66.00%/1 Maximum rate/index of zero response: 85.00%/3

100 90

Prediction success rate (%)

80 70 60 50 40 30 20

Zero response One response

10 0

1000

3000

5000

7000

9000

CRPs

11000

13000

15000

17000

Performed by Linear Programming

Figure 8. Prediction Success Rate Obtained by Linear Programming (CRPs: 1000–18000)

6. Conclusions We experimentally showed that the addition of a shift operation as a post-processing method is an effective approach in increasing randomness in PUFs, even though this approach is valid only under the assumption that shifting is an intrinsic property. In addition, PUF evaluation was tested with logistic regression and a linear programming method. The tested CRP data have extremely low entropy; however, by combining the results, we can conclude that this approach can be an efficient evaluation method with strong analytical abilities. *This paper is an extended version of the paper “Performance of Physical Unclonable Functions with Shift-Register-Based Post-processing” presented to the Security Technology (SecTech2012) [18].

References [1] Physical Unclonable Function Is Ushering a New Era for Security, SmartCards Trends, OMNIPRESS, (2012), December-January. [2] A. Sadeghi and D. Naccache, Editor, “Towards Hardware-Intrinsic Security”, Springer, (2010). [3] J. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk and S. Devadas, “A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications”, IEEE 2004 Symposium on VLSI Circuits, (2004). [4] G. E. Suh and S. Devadas, “Physical Unclonable Functions for Device Authentication and Secret Key Generation”, IEEE Design Automation Conference, DAC2007, (2007). [5] A. Maiti, J. Casarona, L. McHale and P. Schaumont, “A Large Scale Characterization of RO-PUF”, IEEE International Symposium on Hardware Oriented Security and Trust, HOST2010, (2010).

240

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

[6] R. Maes, P. Tuyls and I. Verbauwhede, “Intrinsic PUFs from Flip-flops on Reconfigurable Devices”, 3rd Benelux Workshop on Information and System Security, WISSec2008, (2008). [7] Y. Dodis, L. Reyzin and A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data”, Advances in Cryptology-Eurocrypt 2004, LNCS3027, pp.523-540, Springer Verlag, (2004). [8] D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk and S. Devadas, “Extracting Secret Keys From Integrated Circuits”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, (2005) October. [9] E. Ozturk, G. Hammouri and B. Sonar, “Towards Robust Low Cost Authentication for Pervasive Devices”, IEEE International Conference on Pervasive Computing and Communications, (2008), pp. 170-178. [10] U. Ruhrmair, F. Sehnke, J. Solter, G. Dror, S. Devadas and J. Schmidhube, “Modeling Attacks on Physical Unclonable Functions”, Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), (2010) October 4-8. [11] J. G. Daugman and G. O. Williams, “A Proposed Standard for Biometric Decidability”, Proceedings of CardTech/SecureTech Conference, (1996), pp. 223-234. [12] A. Satoh, T. Katashita and H. Sakane, “Secure Implementation of Cryptographic Modules: Development of a Standard Evaluation Environment for Side Channel Attacks”, Synthesiology-English Edition, vol. 3, no. 1, (2010), pp. 86-95. [13] The download site of Side-channel Attack Standard Evaluation BOard support file in AIST (National Institute of Advanced Industrial Science and Technology), http://www.risec.aist.go.jp/project/sasebo/. [14] Y. Hori, T. Katashita, A. Satoh and T. Yoshida, “Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs”, International Conference on ReConFigurable Computing and FPGAs, ReConFig2010, (2010). [15] On-chip Variability Data, “The Secure Embedded System Group of the ECE Department at Virginia Tech”, http://rijndael.ece.vt.edu/variability/download.html. [16] A Library for Large Linear Classification. http://www.csie.ntu.edu.tw/~cjlin/liblinear/. [17] R. Fan, K. Chang, C. Hsieh, X. Wang and C. Lin, “LIBLINEAR: A Library for Large Linear Classification”, Journal of Machine Learning Research, vol. 9, (2008). [18] H. Kang, Y. Hori, T. Katashita and A. Satoh, “Performance of Physical Unclonable Functions with ShiftRegister-Based Post-processing”, SecTech/CA/CES3 2012, CCIS 339, Springer Verlag, (2012), pp. 14-21.

241

International Journal of Security and Its Applications Vol. 7, No. 4, July, 2013

242

Suggest Documents